Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 113 (0.151 secs)
You searched for: subject:"crypto"
[1] 2 3     Next    Last
[texts]UCSB CRYPTO CONFRENCE - SANTA BARBARIAN
PDF
Keywords: UCSB CRYPTO
Downloads: 1
[unknown]Usenet groups within perl.crypto from giganews.com
Usenet newsgroups within "perl.crypto", contributed courtesy of giganews.com. These captures omit most binary posts.
Keywords: perl.crypto
Downloads: 42
[unknown]Wiki - Crypto
Crypto dumped with WikiTeam tools.
Keywords: wiki; wikiteam; MediaWiki; Crypto; editthisinfo_crypto; unknowncopyright
[audio]Freepto Rischio - avana
freepto
Keywords: freepto; crypto; usb
Downloads: 246
[movies]Installing the I2P darknet software in Linux - Adrian Crenshaw
Installing the I2P darknet software in Linux
Keywords: privacy; crypto; cipherspace
Downloads: 1,420
[unknown]crypto.stanford.edu 2012-11-30 panic downlaod - crypto.stanford.edu
This is a panic download of crypto.stanford.edu as of 2012-11-30. This has lot of pdf papers in it that i think should be archived. It also has lot of big files that are repeated a fews times in it.
Keywords: crypto.stanford.edu; archiveteam
Downloads: 195
[unknown]Usenet groups within alt.sources from giganews.com
Usenet newsgroups within "alt.sources", contributed courtesy of giganews.com. These captures omit most binary posts.
Keywords: alt.sources.crypto; alt.sources
Downloads: 86
[audio]Protecting your Facebook privacy at work isn't just about passwords - Cory Doctorow
Here's a podcast of my last Guardian column, Protecting your Facebook privacy at work isn't just about passwords: Facebook has threatened to sue companies that force their employees to reveal their Facebook login details. As laudable as this is, I worry that it will fail to accomplish its primary objective â protecting Facebook users from employer snooping. Increasingly, firms configure the computers and devices on their internal networks to trust "self-signed certificates"...
Keywords: podcast; audio; crypto; privacy; corydoctorow
Downloads: 2,941
[audio]Blood Drop (Coagulated Remix) - mirage, Crypto Bass
Blood Drop (Coagulated Remix)
Keywords: Blood Drop; Coagulated Remix; mirage; Crypto Bass
Downloads: 20
[audio]Triton (Retrograde Remix) - mirage, Crypto Bass
Triton (Retrograde Remix)
Keywords: Triton; Retrograde Remix; mirage; Crypto Bass
Downloads: 44
[audio]The Counter-Reformation in Stone and Metal: Spiritual Substances - Erik Butler
Paper given at Black Metal Theory Symposium I: Hideous Gnosis HTTP://BLACKMETALTHEORY.BLOGSPOT.COM
Keywords: black metal; crypto-catholicism; immortal; piteous globe
Downloads: 120
[audio]Blood Drop (Collagen Remix) - mirage, Crypto Bass
Blood Drop (Collagen Remix)
Keywords: Blood Drop; Collagen Remix; mirage; Crypto Bass
Downloads: 24
[texts]Raising User Acceptance of Token-based Authentication by Single Sign-On
Secure and reliable authentication is one important part in the scope of IT security, but the practical experience shows that adequate authentication mechanisms are often inconvenient for the populace. Password-based mechanisms dominate as they are easy to use and do not need additional hardware. However, lots of users do not realize the threads with respect to password-based mechanisms: many users use passwords for remote authentication over unsecured channels or in not trustworthy environments...
Keywords: authentication; single sign-on; crypto token
Downloads: 4
[audio]Unforgettable Demure (Blackout Remix) - mirage, Crypto Bass
Unforgettable Demure (Blackout Remix)
Keywords: Unforgettable Demure; Blackout Remix; mirage; Crypto Bass
Downloads: 17
[texts]In Re Decryption
Opinion denying forced decryption on 5th Amendment grounds
Keywords: Hanni Fakhoury; decryption; crypto; Fifth Amendment
Downloads: 55
[texts]A Stick Figure Guide to the Advanced Encryption Standard (AES) - Jeff Moser
A stick figure play in 4 acts describing the history and inner workings of the Advanced Encryption Standard (AES). It goes along with a blog post at http://www.moserware.com/2009/09/stick-figure-guide-to-advanced.html
Keywords: aes; advanced encryption standard; encryption; crypto; cryptography
Downloads: 161
[audio]Metadata – a wartime drama - Cory Doctorow
In this week's podcast, I read aloud a recent Guardian column, "Metadata – a wartime drama":http://www.theguardian.com/technology/2013/jul/05/metadata-wartime-drama-privacyWhich imagines a dialog between Alan Turing and Winston Churchill that might have taken place if the UK Home Secretary Theresa May had been Turing's line-manager"All we can tell with this analysis is who is speaking, what equipment they use to speak, whom else they speak to, who the messages are addressed to, the subject of ...
Keywords: podcasts; metadata; spooks; nsa; turing; bletchleypark; crypto
Downloads: 13,218
[software]MSN Crypto Privacy - http://www.hotdispatch.com/view-ip-requester?ID=16709296
This plug-in for MSN messenger encrypts your messages as you send them across the network.
Keywords: MSN Crypto Privacy; Internet; Communications; Chat messenger add-ons; MSN; MSN Crypto Privacy
Downloads: 102
[texts]Cryptolog Volume XIV Number 2 - National Security Agency
Features: Thrust Four (U) Bulletin Board (U) Information Management For The Future (U) Food For Thought (U) Modem Communications (U) by Frederick Rodean Letters (U) The Reckoning (U) Some Tips On Getting Promoted, 3rd ed. (U) Contributions Solicited Getting Started Golden Oldie (U) NSA-Crostic No. 64 (U) How Russians View Their Leaders (U)
Keywords: NSA; Cryptolog; declassified; redacted; personnel; promotion; nsa; crypto; personnel summaries; personnel summary; crypto log; promotion files
Downloads: 4
[texts]Cryptolog Volume IV Number 11 - National Security Agency
Features: [Redacted] Objective Satisfaction Score: Collection Director's Memorandum: [Redacted] by Vice Admiral B.R. Inman Cure For Time-In-Grade Syndrome A Little T.A. Problem Backing Into Language Acquisition NSA-Crostic No. 10 by A.J.S. How Many African Countries Can You Spot? Language Processing Forum C.A.A. News What Ever Does "However" Mean? Letters To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; crypto; november; log; crypto log; top secret; secret spoke; foreign language
Downloads: 8
[software]Top Secret Crypto Gold - http://www.topsecretcrypto.com
This software includes Top Secret Chat and Top Secret Journal, with file and e-mail encryption. It includes spell checking for e-mail, journal, and chatting and uses RSA Public Key Cryptography with the One Time Pad Encryption System. Conduct an encrypted peer-to-peer secure chat over the Internet. Maintain an encrypted journal or diary. The program supports RSA key sizes 480 to 16,384 bits. Insert up to 60 smileys in e-mail, journal entries, and chat sessions...
Keywords: Top Secret Crypto Gold; System and utilities; File tools; File encryption; Top Secret Crypto Gold
Downloads: 150
[texts]Cryptolog Volume IV Number 6 - National Security Agency
Features: Human Factors And Systems Design Old Russian Manuscript Ciphers SIGINT Welcomes Inkstand AG-22/IATS: A View From The Bridge Vich ISS R-r- Right? by A.J.S. Letters To The Editor CLA Announcement: Annual Banquet
Keywords: NSA; Cryptolog; declassified; redacted; secret; linguists; june; crypto; secret spoke; crypto log; english sounds; top secret
Downloads: 12
[software]Crypto Pilot - http://www.colorpilot.com/cryptopilot.html
This is a file-encryption program that protects your files and folders from unauthorized access. Just drag and drop files to protect your data. The program enables you to create encrypted data backup, create a key to your file from a floppy or Flash drive, hide some files from co-workers and family members, send encrypted files, and protect your future plans from competitors.
Keywords: Crypto Pilot; System and utilities; File tools; File encryption; Crypto Pilot
Downloads: 30
[texts]Cryptolog Volume II Numbers 8 and 9 - National Security Agency
Features: 20 Years Of Transposition Processing [Redacted] Communications The Voynich Manuscript: Third Theory by Doris Miller Typewriter Random: A New Look A Fix For The Language Problem? by John B. Thomas, Jr. Abdul And His 40 Tanks by Frederic O. Mason, Jr. Linguists -- We Need An "Experts Yellow Pages" Letter To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; secret; umbra; crypto; unclassified; top secret; secret umbra; crypto log; subject matter
Downloads: 13
[audio]Wait Until Kingdom Come (Osmium Mix) - mirage, Crypto Bass
Wait Until Kingdom Come (Osmium Mix)
Keywords: Wait Until Kingdom Come; Osmium Mix; mirage; Crypto Bass
Downloads: 4
[texts]Acerca de un caso de sinfisoceria asociada a una posible cripto-meiomelia de la antena izquierda en Trox cotodognanensis Compte, 1985 (Coleoptera: Trogidae). - Verdugo, A.
syphysocre in Trox cotodognanensis
Keywords: Symphysocery; possible crypto-meiomelia; Trox cotodognanensis; Doñana; Spain
Downloads: 79
[audio]Have You Embraced the Beast (1998) - TK Major
Originally recorded and posted to the net in 1998 as part of TK Major's Song of the Day Project, this archive recording has been lovingly remastered to bring it more in line with today's squashed, dynamics-free standards (that's a joke, son) and included here for no good reason except because it amused him.
Keywords: greed, hate, beast, death squad, Reagan, Bush, crypto-fascism
Downloads: 1,590
[audio]Wait Until Kingdom Come (Iron Mix) - Crypto Bass, mirage
Wait Until Kingdom Come (Iron Mix)
Keywords: Wait Until Kingdom Come; Iron Mix; Crypto Bass; mirage
Downloads: 9
[audio]LB #32: The Crypto-Anarchist Manifesto
An intriguing little publication of sorts I happened to stumble upon. Music courtesy of Badadam's "Drifter."
Keywords: The Crypto-Anarchist Manifesto Badadam Drifter Last Bastille Podcast
Downloads: 25
[texts]Cryptolog Volume VIII Numbers 1-3 - National Security Agency
Features: Sigint In The 80s: Two Views (U): I. Robert E. Rich II. William Lutwiniak Kittiwake (U) How To Improve Your Promotion Potential NSA-Crostic No. 32 by D.H.W. Translator In Your Pocket (U) Some Things Never Change (U) NCS-CLA Symposium (U) Why Do They Leave? (U)
Keywords: NSA; Cryptolog; declassified; redacted; language; unclassified; linguists; sigint; crypto; crypto log; top secret; secret handle; career field
Downloads: 2
[texts]Cryptolog Volume VI Number 10 - National Security Agency
Features: Snowballs On The Roof (U) by Vera R. Filby Another Source (U) NSA-Crostic No. 29 (U) by DHW The Roads Around Us (U) The 2000- Year-old Transcriber (U) Letter To The Editor (U) Club News (U)
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; nsa; antenna; equipment; crypto; crypto log; cryptologic community; unused property; condition codes
Downloads: 3
[texts]Cryptolog Volume V Numbers 7 and 8 - National Security Agency
Features: The Soviet General Staff Has It Ever Been Translated Before? Another Country Trigraph System Is A Translator A Professional? The Bucky Balance Tell Me I'm Just A Sinobibliophobe! NSA-Crostic No. 16 by David H. Williams News Of The Communications Analysis Association I Remember Spellman by A. J. Salemme New Board Members; No More Mispellings [sic] Letters To The Editor by [Redacted] Gurin, [Redacted]
Keywords: NSA; Cryptolog; declassified; redacted; project; translations; translation; nsa; general staff; project starter; armed forces; crypto log
Downloads: 3
[movies]In Her Own Voice: Doña Teresa Aguilera y Roche and Intrigue in the Palace of the Governors - New Mexico History Museum, Department of Cultural Affairs
Dr. Frances Levine's lecture âIn Her Own Voice: Doña Teresa Aguilera y Roche and Intrigue in the Palace of the Governorsâ. Presented February 20, 2010, as part of the ongoing lecture series accompanying "Santa Fe Found: Fragments of Time: The archaeological and historic roots of Americaâs oldest capital city." New Mexico History Museum Auditorium, Santa Fe, New Mexico.
Keywords: santa fe; new mexico history museum; santa fe found; archaeology; crypto-jews; inquisition; jewish heritage
Downloads: 22
[texts]Cryptolog Volume VI Number 7 - National Security Agency
Features: Source Protection: Our Agency's Insurance Policy (U) Naval Readiness: A Basis For Comparison (U) NSA-Crostic No. 27 (U) by D.H.W. Wilt Thou, Angelina? (U) by Sydney Fairbanks Gears Of The Mouth (U) by Donald Lasley Letters To The Editor (U) Expert (U) Shootout At The SIGINT Corral (U)
Keywords: NSA; Cryptolog; declassified; redacted; sigint; unclassified; naval; submarines; crypto log; language quality; quality control; german naval
Downloads: 3
[texts]Cryptolog Volume V Number 1 - National Security Agency
Features: Early Proposal For Satellite Remoting by Joseph E. Horn Comint, Comsec, And Hilbert's Tenth The Changing Face Of N.S.A But Why Do We Do It Thanks For The Attaboy! What Ever Happened To Copes? "The Man Who Broke Purple" by P. William Filby A. C. Brown's "Bodyguard Of Lies" NSA-Crostic No. 11 by David H. Williams C.A.A. News Joys And Frustrations Of Plural-Dropping by A.J.S. Letter To The Editor
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; nsa; plural; comsec; crypto log; traffic analysis; top secret; tenth problem
Downloads: 3
[texts]Cryptolog Volume V Number 11 - National Security Agency
Features: Wedding Bells And That Old Gang Of Mine by E. Leigh Sawyer A Small Problem NSA Data Standards Center by Mark T. Pattie, Jr. Linguistics And The Code Reconstructor by Stuart H. Buck Dialogue Between Ms. User And Dr. Analysis Cast A Double Shadow: Trojan Horse Of SIGINT Formatting PL/1 Source Code NSA-Crostic No. 19 by David H. Williams Never On My Watch Letters To The Editor by [Redacted], Anon C.A.A...
Keywords: NSA; Cryptolog; declassified; redacted; data; nsa; sigint; unclassified; data standards; crypto log; nsa data; top secret
Downloads: 3
[texts]Cryptolog Volume VI Number 1 - National Security Agency
Features: Solis -- A Vehicle In Search Of An Engine How Do You Tell These Two Clowns Apart? The Return To H.F. Second Sighting by Sue Donym Japanese Translation At A.H.S. T-vision: Medium Of The Future Reflections And Recommendations by Vera R. Filby Human Factors Newsletter NSA-Crostic No. 21 by David H. Williams Golden Oldie: On Opening "Statistics" by Marjorie Mountjoy Henry Cement & Phantoms Of Opera(tions) Classification Corner: It's Party Time! Publisher's Message
Keywords: NSA; Cryptolog; declassified; redacted; user; unclassified; warc; translation; reconstruction begun; code book; crypto log; translation published
Downloads: 3
[texts]Cryptolog Volume V Number 10 - National Security Agency
Features: Data Security And Human Error Continuing Professionalization Method Of Measuring Negative Intelligence Can't Tell Wheat From Chaff by J. Gurin Reduction Ratios In Micrographics by Don Snow Back To Square One! Feeding The Germans Misinformation by P.W. Filby And-a You Betta Have Moti-vaysh! News Of Communications Analysis Association by W.E.S. More B. S. (before Spellman) Letters To Editor by Pattie, Filby, [Redacted] NSA-Crostic No...
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; professionalization; data; stenotypy; top secret; crypto log; reduction ratio; career field
Downloads: 3
[texts]Cryptolog Volume V Number 2 - National Security Agency
Features: Collection-Support T.A. Is Not For Everyone Unseen Go-between: Conference Interpreter by J. Gurin First Lady Of Naval Cryptology C.A.A. News Military Cryptologic Supervisors Course More Beans by Vera Ruth Filby By-lines Don't Cost -- They Pay! by John J. Mollick "No, Winnie, You've Got It Upside-down! " by A.J.S.
Keywords: NSA; Cryptolog; declassified; redacted; unclassified; cryptologic; naval; umbra; top secret; secret umbra; crypto log; umbra february
Downloads: 3
[texts]Cryptolog Volume V Number 3 - National Security Agency
Features: Some Background On The C/T Merger by Frank Smith Hand Is Not Quicker Than The Eye A Donkey In Your What? A Linguist Looks At The "Tube" Letters To The Editor An Idea For An Article by Doris E. Miller Word- Seek NSA-Crostic No. 12 by A.J.S. C.L.A. News: C.A.A. News Cure For "Performance Syndrome"
Keywords: NSA; Cryptolog; declassified; redacted; adp; communications; nsa; march; crypto log; top secret; secret spoke; data processing
Downloads: 3
[software]CryptoCrat 2004 - http://www.cryptocrat.com/
This program compresses multiple files into a single, 448-bit encrypted file. It convert data to gibberish, and the original file can only be unscrambled and read by someone who knows the password. The program also supports secure deletion of files from the hard drive. You can create encrypted self-extracting executables to send by e-mail, and the program integrates with the Windows context menu.
Keywords: CryptoCrat 2004; System and utilities; File tools; File encryption; Crypto Crat 2003
Downloads: 41
[texts]Cryptolog Volume V Number 6 - National Security Agency
Features: Bookbreakers Forum On Machine Aids Equipment Maintenance On Abner Golden Oldie: Unknown Location Of U/I Unit Never Again! by Jack Gurin Computer Scratch Pad: At Home Or At Work? by Bill Crowell Minnie's Mini by Minnie M. Kenny NSA-Crostic No. 15 by A.J.S. As I Was Saying Two Years Ago by Mark T. Pattie, Jr Celtic Languages Today Letter To The Editor by E.A. Gilbertson C.A.A. News
Keywords: NSA; Cryptolog; declassified; redacted; celtic; gaelic; unclassified; nsa; top secret; crypto log; celtic languages; secret umbra
Downloads: 3
[texts]Cryptolog Volume VI Number 4 - National Security Agency
Features: COMSEC/SIGINT Relations (U) by David G. Boak A Somewhat Larger Problem (U) Classic Cables (U) Fear Of Testing... And What To Do About It (U) More Fairbanks On English (U) by Sydney Fairbanks NSA-Crostic No. 24 (U) by D.H.W. Letters To The Editor (U) Bookbreaker's Forum (U) But, Mr. Boak, Did You Ever Try To Get Rid Of One In A Hurry! (U) by D.H.W.
Keywords: NSA; Cryptolog; declassified; redacted; phobia; nsa; unclassified; secret; secret handle; crypto log; going upstairs; second party
Downloads: 3
[texts]131
The world of Fiat currencies are old, outdated, not enough hard currency moneysupply and mismanaged by its current governments (Currency Wars) and now starting tocause Social unrest, this is only the beginning and trying to get ahead of and prevent thisvery serious situation from getting really out of hand. The world has experienced GlobalFinancial Crisis (2008 -2013), Central Banks disorder = Major Social disorder & unrest...
Keywords: Fiat currencies; Currency Wars; crypto currencies; Central Banks disorder; Social disorder; Global Financial Crisis
Downloads: 5
[texts]Cryptolog Volume VIII Numbers 4-6 - National Security Agency
Features: Middle-Age Spread (U) Grading The Russian PQE (U) Third Party Relationships (U) The Poets' Corner (U) NSA-Crostic No. 33 (u) by D.H.W. Classic Cables (U) Traffic Analysis: Specialty Without Portfolio (U) DIA Videocasette Program (U)
Keywords: NSA; Cryptolog; declassified; redacted; grading; pqe; secret; errors; crypto log; top secret; secret spoke; grading system
Downloads: 3
[texts]Cryptolog Volume X Number 10 - National Security Agency
Features: Crisis Management: Remarks (U) by Lincoln D. Faurer Soviet Military Goals And Their Effect On Negotiations For Arms Limitations (U) Tips On Topical Reporting (U) Thousands Miss Demonstration (U) Looking Around: Telecom 83 (U) Banners, Cowboy Hats, And ELINT Notations (U)
Keywords: NSA; Cryptolog; declassified; redacted; menwith; military; oct; soviet; menwith hill; task force; crypto log; soviet military
Downloads: 2
[texts]Cryptolog Volume XIII Number 12 - National Security Agency
Features: Technology Seepage (U) Who Is She? (U) CRYSCOM (U) Quote Without Comment (U) The Language Identification Problem (U) Product vs Process (U) Changing Jobs (U) Ode To The CA Intern Program (U) A Composite Conversation (U) Book Review [GCHQ: The Secret Wireless War 1900-1986] (U) by Vera Filby Conference Report (U) Letter (U) Opportunity (U) Bulletin Board (U) CISI Conference (U) The Story Of A Private German Cipher (U) NSA-Crostic No...
Keywords: NSA; Cryptolog; declassified; redacted; december; secret; nsa; sigint; spread spectrum; comint channels; crypto log; spreading code
Downloads: 4
[texts]Cryptolog Volume XIII Numbers 8-9 - National Security Agency
Features: Something New (U) Rum Runners, 1930 (U) Enter Your Passphrase, Please (U) Extended Hours At Learning Center #1 (U) Collection Management (U) Bulletin Board (U) Senior Professional Career Program (U) Back-up Shells For The ASTW (U) Conference Report (U) Book Reviews: Out Of The Inner Circle (U) ... Secrecy, Authentication , And Public Key Systems (U) ... The Computation Of Style (U) ... Italian For Educated Guessers (U) Letters (U) A Private German Cipher Of WWI (U)
Keywords: NSA; Cryptolog; declassified; redacted; user; collection; password; coast; coast guard; collection management; crypto log; computer security
Downloads: 5
[texts]Cryptolog Volume XIII Numbers 1-2 - National Security Agency
Features: What I Perceive To Be Happening In The Pacific (U) Diary Of A Geisha (U) Career Opportunity (U) A Case Of Forensic SIGINT (U) CRYSCOM-86 (U) A Morality Play In One Act (U) A Problem In Retrieval (U) Improving Training In Technical ELINT (U) Bulletin Board (U) Letters (U) Puzzle (U)
Keywords: NSA; Cryptolog; declassified; redacted; elint; product; secret; nsa; red works; crypto log; technical elint; secret spoke
Downloads: 4
[texts]Cryptolog Volume XIII Numbers 10-11 - National Security Agency
Features: A New Kind Of Japanese (U) SIREN No. 5 (U) A Summer Language Course (U) On The Lighter Side (U) The Representation Of Prefixes Conference Report (U) by N.C. Gerson Technical Literature Review (U) Software Review (U) Bulletin Board (U) Letters (U) From The Past Results Of Readers' Survey (U) Puzzle (U)
Keywords: NSA; Cryptolog; declassified; redacted; collection; pts; expert; comint; expert system; pts single; personal consultant; crypto log
Downloads: 4
[1] 2 3     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

texts
audio
software
movies
web